Data analysis techniques are critical in maximizing opportunities and strengthening the business case for a data analysis strategy, yet Accenture reports that only 32% of companies can currently extract business value from their data. This report defines different categories of data analysis, then examines quantitative, qualitative and statistical data analysis techniques, and wraps up with advice on how to unlock the business value of such techniques.

The final report of the Commission of Inquiry into Money Laundering in British Columbia was released on 22 June 2022. Since the Commission was announced in May 2019, it has held five community meetings around the province, undertaken thousands of hours of investigation, research and interviews, held 143 hearing sessions over 138 hearing days, heard testimony from 199 witnesses with an additional 23 witnesses providing evidence via sworn affidavit, received 1,063 exhibits, and released an Interim Report.

The Communications Security Establishment has both defensive capabilities and what are called "active" capabilities – which allow it to disrupt foreign online threats to Canada's system. The 2021-2022 annual report gives some details about the cyber campaigns it is waging to safeguard national security. The report says the CSE has used its active cyber operations capabilities to disrupt the efforts of foreign-based extremists to "recruit Canadian nationals, operate online and disseminate violent extremist material."

Most police agencies in North America have acknowledged a deficiency in female and minority recruits. A new report from Trident University, entitled Signaling Diversity: A Study of Recruitment Strategies for Female and Minority Police Candidates, helps police services develop strategies to attract diverse and minority candidates to their respective organizations.

(April 2019) – The NSICP annual report, which had been delivered to the PM in December 2018, has now been released to the public. It covers topics of intelligence priorities, defence intelligence activities, legal authorities, plus oversight and accountability. Numerous federal departments and agencies were involved: CBSA; CSIS; CSE; Justice; DND and the Canadian Armed Forces; FINTRAC; GAC; IRCC; Integrated Terrorism Assessment Centre; PCO; Public Safety; RCMP; and Transport Canada.

(June 2018) The Arctic is gaining global significance for its rising strategic, economic values and those relating to scientific research, environmental protection, sea passages, and natural resources. States from outside the Arctic region do not have territorial sovereignty in the Arctic, but do have rights in respect of scientific research, navigation, overflight, fishing, laying of submarine cables and pipelines in the high seas and other relevant sea areas in the Arctic Ocean.

The Electronic Devices Privacy Handbook, released by the BC Civil Liberties Association and the Samuelson-Glushko Canadian Internet Policy and Public Interest Clinic, will help travellers understand their data privacy rights at border crossings, offers best practices for securing digital devices, and what to do if you've been searched.

The names Harvey, Irma, Maria, and Jose were once like any other. Now, they make those who were affected by 2017's hurricane season shudder. Forecasts for 2018 project that the number of storms this year will be higher than average. This free resource will help your organization prepare.

The United Kingdom's National Security Strategy provides a comprehensive basis for planning and delivering the most important responsibility of Government – protecting the country and safeguarding its people and way of life. This 2009 update documents guiding principles and a strategic framework. It outlines the why, who or what, and how these strategies will be implemented.

(February 2010) W3C has published a report and full minutes of the Workshop on Access Control Application Scenarios, held in Luxembourg on 17th and 18th of November 2009. Participants from 17 organizations examined the current limitations of access control, privacy enhancement, distributed handling of access control, and other challenging use cases.